General

  • Target

    stage_4_remcos.bin

  • Size

    469KB

  • MD5

    ba07eb52ad32844e2a34c9a30e92d4f9

  • SHA1

    e87c52e3fd76d2120f671c8f3163255fbeec564f

  • SHA256

    4c565f789e34d0cf9d6cb7361ad45a5a2ffa01f664dcd49a1da2e25be36f5682

  • SHA512

    b5cbf9f7cb4232445292d56e7be820c7046090c3a0b7a677369ab1f3b972238db47b94218cd25be4280f658306ab13c617b91b9c53d805c4bb1d3f54e609083c

  • SSDEEP

    12288:Omnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSqn9:2iLJbpI7I2WhQqZ7q9

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost Ewa Cartoon

C2

164.68.105.38:1960

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-C9NN2D

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • stage_4_remcos.bin
    .exe windows x86

    5d354883fe6f15fcf48045037a99fb7a


    Headers

    Imports

    Sections